Computer Forensics Fundamentals

An introduction to Computer Forensics, to demonstrate the process of going from the crime scene to the court room.
4.6 (47 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
856 students enrolled
70% off
Take This Course
  • Lectures 17
  • Length 1 hour
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 11/2013 English

Course Description

Computer Forensics Fundamentals will provide:

  • Foundational concepts about the computer forensics field
  • Understanding of hexadecimal and hashing in relations to computer forensics
  • An introductory understanding of what computer forensics is
  • The process of collecting digital evidence
  • How do create, mount and explore forensic digital images
  • Considerations for first responders to a computer crime scene

The course will consist of presentations to explain the concepts of computer forensics as well as demonstrations of proper collections of digital evidence.

This course is designed for anyone with an interest computer forensics to get a taste of the real world of digital forensics examination.

As an introductory course it will consist of presentations, hands on lessons and quizs.

What are the requirements?

  • Basic knowledge of computers and ability to run software applications

What am I going to get from this course?

  • Understanding what computer forensics is
  • Be able to make a forensics image from a drive
  • Be able to mount a drive for analysis
  • Understand basic artifacts of the operating system
  • Understand basics of first responder to scene and what should be done to secure the digital evidence

Who is the target audience?

  • Anyone with an interest in computer forensics

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Understanding what computer forensics is

Introduction and layout of the course. What will be taught and how it will be taught


The course introduction giving a working definition of what computer forensics is, the steps of basic computer forensics and ways computers can be used to commit a crime.

4 questions

Quiz on what was covered in introduction

Section 2: Understanding Hash and hexadecimal

This lecture covers what hash files are and how they are used in different ways in computer forensics.

2 pages

This is a lab exercise to the understanding hash files better. You can create your own txt files or download the ones in the lecture extras section.


This lecture covers the hexadecimal numbering system and how it is used in computer forensics.

1 page

This is a lab exercise to understand hex editor software and file headers better. Download the 3 supplemental files and follow the instructions in the lab.

8 questions

Quiz about understanding of hash values and hexadecimal numbers

Section 3: Understanding hardware and file sytems in relation to computer forensics

This lecture covers the physical and logic copies of hardware, slack space and RAM


This lecture covers hardware devices, file systems and operating systems.

9 questions

Quiz on hardware storage devices, RAM and locations/types of evidence

Section 4: Imaging software

An overview of the forensics imaging software used to make, mount and explorer forensic images.

Downloading and Installing the software
1 page
Section 5: Image acquisition
Creating a Forensic Disk Image

Demonstration on how to add evidence to a case

Acquiring an Image
1 page
Section 6: Mounting and Exploring an image file

Demonstration of how to mount and image as a drive letter


Over view demonstration of exploring an image

Section 7: First responder supplimental

This lesson covers procedures for first responders to a scene collecting evidence.

6 questions

Quiz on response to a crime scene

Section 8: Conclusion and where to go from here

Wrap up and recommendations on where to go from here and in the future.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

John Boyle, IT and Business Professional, ACE, ENCE

Having advanced degrees in Information Technology and over a decade of experience in the field working with hardware, software, networking and databases. I have a passion for computer forensics because it involved detective skills as well as IT proficiency and the combination is a growing field that keeps getting bigger. My profession certifications in the computer forensics field include AccessData Certified Examiner (ACE), EnCase Certified Examiner (ENCE) and Cyber Incident Responder Certificate from the DOD Defense Cyber Crime Center. I bring a diverse experience of IT related topics that i have encountered in my career and paths of study.

In addition to my work in the IT field I also have a diverse background in business, leadership and communications. With interesting in subject matter such as body language and group dynamics, I am able to competently talk about this subject matter with ease. I hope to be adding course on these types of subjects as part of my future endeavors as a Udemy instructor.

Since my childhood I have had the hobby of genealogy. I have traced my family tree through out the United States and Europe. I have combined my fascination with technology and with genealogy to help speed up my research and improve my results. My work in Computer Forensics, finding evidence on a hard drive has assisted with my hobby of finding relatives in my family tree. Both are different forms of detective work that require tracing things back to the origins.

Ready to start learning?
Take This Course